Zobrazeno 1 - 10
of 5 086
pro vyhledávání: '"Logistic map"'
Publikováno v:
Mağallaẗ Al-kūfaẗ Al-handasiyyaẗ, Vol 15, Iss 4, Pp 55-64 (2024)
Encryption is crucial because of how integral to daily life things like smartphones, computers, and the internet have become. It's almost inconceivable to think about getting by without it. Everything from paying bills and buying goods to email and s
Externí odkaz:
https://doaj.org/article/7904df4cbbcd4736b7ba186bae620281
Autor:
Bo-Wen Shen
Publikováno v:
Encyclopedia, Vol 4, Iss 3, Pp 1134-1146 (2024)
This entry examines Lorenz’s error growth models with quadratic and cubic hypotheses, highlighting their mathematical connections to the non-dissipative Lorenz 1963 model. The quadratic error growth model is the logistic ordinary differential equat
Externí odkaz:
https://doaj.org/article/990a797e4c0f4fcdae4bf0e4fa7a7467
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-28 (2024)
Abstract This research paper investigates discrete predator-prey dynamics with two logistic maps. The study extensively examines various aspects of the system’s behavior. Firstly, it thoroughly investigates the existence and stability of fixed poin
Externí odkaz:
https://doaj.org/article/f35c5abb25384c558f35579288f32d66
Publikováno v:
IEEE Access, Vol 12, Pp 4825-4844 (2024)
In recent years, the chaotic logistic map key (CLMK) has been widely used for image encryption due to its ability to generate random and unpredictable sequences of numbers. The CLMK algorithm uses the chaotic logistic map to generate a key stream, wh
Externí odkaz:
https://doaj.org/article/e949f2bafca1494b9be9f9524084d909
Publikováno v:
Jurnal Nasional Teknik Elektro dan Teknologi Informasi, Vol 13, Iss 2, Pp 93-100 (2024)
Face recognition uses biometric technologies to identify humans based on their facial characteristics. This method is commonly used to restrict information access control. The benefits of face recognition systems encompass their ease of use and secur
Externí odkaz:
https://doaj.org/article/0c85796051d54d6ab62c03498d648766
Autor:
B. Sakthi Kumar, R. Revathi
Publikováno v:
Journal of Engineering and Applied Science, Vol 71, Iss 1, Pp 1-24 (2024)
Abstract In the last few years, multimedia technology has made tremendous strides. These days, the Web is frequently used to transfer multimedia content, including audio, video, and photos. However, the Internet is a very vulnerable medium with many
Externí odkaz:
https://doaj.org/article/dc45f777936c458f8d10b56075ecec47
Publikováno v:
IEEE Access, Vol 12, Pp 123401-123422 (2024)
In the current era of digital communication, image security is a top priority as sending images, which often contain personal or confidential information, over the Internet poses security risks. Many encryption algorithms have been proposed in the li
Externí odkaz:
https://doaj.org/article/7c1cceb8355a4757a22f41d88172b7d7
Publikováno v:
IEEE Access, Vol 12, Pp 123694-123715 (2024)
The secrecy of various forms of multimedia data constitutes a significant aspect of the cybersecurity field. In this case, chaos-based image ciphers can be adapted. Chaotic image encryption has been investigated in the literature using different tran
Externí odkaz:
https://doaj.org/article/e91d350127c04f16aa345a6f3d9eaef5
Autor:
Phuc-Phan Duong, Hieu Minh Nguyen, Ba-Anh Dao, Binh Kieu-Do-Nguyen, Thai-Ha Tran, Trong-Thuc Hoang, Cong-Kha Pham
Publikováno v:
IEEE Access, Vol 12, Pp 63976-63994 (2024)
Substitution boxes (S-Boxes) are essential elements of modern block ciphers, serving as non-linear characteristics that enhance the resistance of these ciphers against cryptanalysis. This research presents a new approach for constructing lightweight
Externí odkaz:
https://doaj.org/article/e89dc2a6685f42279e7ed8ab035f9343
Publikováno v:
IEEE Access, Vol 12, Pp 38382-38398 (2024)
Medical image encryption is essential to protect the privacy and confidentiality of patients’ medical records. Deep learning-based encryption, which leverages the nonlinear characteristics of neural networks, has emerged as a promising new method f
Externí odkaz:
https://doaj.org/article/9ba88b17ff2041849c3a7dc2ae75874f